Cargando…

Computer security /

Computer Security, Second Edition aims to present different ideas and practices that promote the prevention of attacks on computer systems and data being compromised. The book is divided into five parts. Part I covers the important elements of computer security and case histories of computer-related...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Carroll, John M. (John Millar), 1925-2011
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Boston : Butterworths, �1987.
Edición:2nd ed.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Front Cover; Computer Security; Copyright Page; Dedication; Table of Contents; Acknowledgments; Introduction; PART I: The Threat to Computer Security; Chapter 1. Essentials of Computer Security; UNIQUE EDP SECURITY PROBLEMS; EDP SECURITY IN A NUTSHELL; Chapter 2. A Casebook of Computer Crime; CASE HISTORIES; CONCLUSION; PART II: Security Management Considerations; Chapter 3. Organizing for EDP Security; EDP SECURITY IN THE PUBLIC SECTOR; EDP SECURITY IN THE PRIVATE SECTOR; CORPORATE EDP SECURITY; DUTIES OF THE SECURITY COORDINATOR; PRINCIPLES OF SECURITY MANAGEMENT.
  • Chapter 4. Protection of InformationCLASSIFICATION-THE GOVERNMENT MODEL; CLASSIFICATION-THE CORPORATE MODEL; SPECIAL PROBLEMS WITH EDP; MARKING CLASSIFIED MATTER; STORING CLASSIFIED MATTER; DESTROYING CLASSIFIED MATTER; RESIDUAL MEMORY IN MAGNETIC MEDIA; PROCEDURAL SAFEGUARDS FOR CLASSIFIED MATTER; CONCLUSION; Chapter 5. Screening and Management of Personnel; MANAGEMENT RESPONSIBILITY; RELATIONS WITH VENDORS; CATEGORIES OF SECURITY CLEARANCE; SECURITY SCREENING OF EMPLOYEES; PERSONNEL SECURITY POLICIES; CONCLUSION; PART III: Physical Security; Chapter 6. Physical Access Control.
  • BASICS OF ACCESS CONTROLAUTOMATIC ACCESS CONTROL; KEY ACCESS CONTROL; CONCENTRIC CONTROLLED PERIMETERS; OUTER PERIMETER ACCESS; BUILDING ACCESS CONTROL; CONTROL OF ACCESS TO RESTRICTED AREAS; MATERIAL CONTROL IN RESTRICTED AREAS; COMPUTER ROOM ACCESS CONTROL; Chapter 7. Physical Security; THE FORTRESS CONCEPT; OUTER PERIMETER DEFENSE; BUILDING PERIMETERS; RESTRICTED AREA PERIMETER; COMPUTER ROOM SECURITY; Chapter 8. Environmental Security; ELECTRICAL POWER; GROUNDING; INTERFERENCE SUPPRESSION; DUST CONTROL; ENVIRONMENTAL CONTROLS; Chapter 9. Disaster Control; LOCATING THE COMPUTER CENTER.
  • PROTECTING THE COMPUTER CENTERAUTOMATIC FIRE DETECTION; GENERAL FIRE-SAFETY PLANNING; DISASTER RECOVERY; PART IV: Communications Security; Chapter 10. Line Security; COMMUNICATIONS SECURITY SUBFIELDS; DEFINITION OF TERMINAL; SECURITY OF COMMUNICATIONS CABLES; INTERIOR COMMUNICATIONS LINES; TELEPHONE INSTRUMENT SECURITY; ADDITIONAL LINE SECURITY CONSIDERATIONS; LOCAL AREA NETWORKS; SPACE RADIO INTERCEPTION; Chapter 11. Transmission Security; GENERAL CONSIDERATIONS; OPERATING PROCEDURES; SPEECH PRIVACY; ERROR-PROOF CODES; TRAFFIC ANALYSIS; Chapter 12. Cryptographic Security.
  • INTRODUCTION TO CRYPTOLOGYOVERVIEW OF CYPHERS; HOW CYPHERS WORK; HOW DES WORKS; NETWORK COMMUNICATIONS SECURITY; WEAKNESSES OF DES; WAYS TO USE DES; ASYMMETRICAL CYPHERS; CRYPTO PROCEDURES; CRYPTANALYSIS; SUMMARY; Chapter 13. Emission Security; EMISSION PROBLEMS; PROBABILITY OF INTERCEPTION; DEFENSE MECHANISMS; MEASURING ELECTROMAGNETIC EMANATION LEVELS; ADDITIONAL DEFENSES; DEFENSE AGAINST ACOUSTICAL EMANATIONS; Chapter 14. Technical Security; VICTIMIZATION OF EDP CENTERS; CATEGORIES OF TECHNICAL SURVEILLANCE; DEFENSES AGAINST TECHNICAL SURVEILLANCE; TYPES OF INTRUSION DEVICES.